Sciweavers

36 search results - page 2 / 8
» Spam Over Internet Telephony and How to Deal with it
Sort
View
CEAS
2008
Springer
13 years 7 months ago
A Survey of Modern Spam Tools
Over the past 5 years, spam sending technology has improved dramatically. Static messages sent opportunistically through misconfigured hosts have evolved into dynamically generate...
Henry Stern
CEAS
2004
Springer
13 years 11 months ago
Personalised, Collaborative Spam Filtering
The state of the art sees content-based filters tending towards collaborative filters, whereby email is filtered at the MTA with users feeding information back about false posit...
Alan Gray, Mads Haahr
CEAS
2006
Springer
13 years 9 months ago
Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task
ISPs operate "abuse" teams to deal with reports of inappropriate email being sent by their customers. Currently, the majority of this work is dealing with insecure syste...
Richard Clayton
SIGCOMM
2006
ACM
13 years 11 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 days ago
Detecting SPIT Calls by Checking Human Communication Patterns
— SPam over Internet Telephony (SPIT) is expected to become a very serious issue in the next years. The threat is going to spin out from the well known email spam problem by bot ...
Jürgen Quittek, Saverio Niccolini, Sandra Tar...